Abstract is missing.
- Boosting Authenticated Encryption Robustness with Minimal ModificationsTomer Ashur, Orr Dunkelman, Atul Luykx. 3-33 [doi]
- ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message AuthenticationTetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin. 34-65 [doi]
- Message Franking via Committing Authenticated EncryptionPaul Grubbs, Jiahui Lu, Thomas Ristenpart. 66-97 [doi]
- Key Rotation for Authenticated EncryptionAdam Everspaugh, Kenneth G. Paterson, Thomas Ristenpart, Samuel Scott. 98-129 [doi]
- Kurosawa-Desmedt Meets Tight SecurityRomain Gay, Dennis Hofheinz, Lisa Kohl. 133-160 [doi]
- Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning TechniquesShota Yamada. 161-193 [doi]
- Identity-Based Encryption from Codes with Rank MetricPhilippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich. 194-224 [doi]
- Degree Evaluation of NFSR-Based CryptosystemsMeicheng Liu. 227-249 [doi]
- Cube Attacks on Non-Blackbox Polynomials Based on Division PropertyYosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier. 250-279 [doi]
- Middle-Product Learning with ErrorsMiruna Rosca, Amin Sakzad, Damien Stehlé, Ron Steinfeld. 283-297 [doi]
- All-But-Many Lossy Trapdoor Functions from Lattices and ApplicationsXavier Boyen, Qinyi Li. 298-331 [doi]
- All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWEBenoît Libert, Amin Sakzad, Damien Stehlé, Ron Steinfeld. 332-364 [doi]
- Amortization with Fewer Equations for Proving Knowledge of Small SecretsRafaël Del Pino, Vadim Lyubashevsky. 365-394 [doi]
- Private Multiplication over Finite FieldsSonia Belaïd, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, Damien Vergnaud. 397-426 [doi]
- Anonymous Attestation with Subverted TPMsJan Camenisch, Manu Drijvers, Anja Lehmann. 427-461 [doi]
- Hedging Public-Key Encryption in the Real WorldAlexandra Boldyreva, Christopher Patton, Thomas Shrimpton. 462-494 [doi]
- Information-Theoretic Indistinguishability via the Chi-Squared MethodWei Dai, Viet Tung Hoang, Stefano Tessaro. 497-523 [doi]
- Indifferentiability of Iterated Even-Mansour Ciphers with Non-idealized Key-Schedules: Five Rounds Are Necessary and SufficientYuanxi Dai, Yannick Seurin, John P. Steinberger, Aishwarya Thiruvengadam. 524-555 [doi]
- Encrypted Davies-Meyer and Its Dual: Towards Optimal Security Using Mirror TheoryBart Mennink, Samuel Neves. 556-583 [doi]
- A Formal Treatment of Multi-key ChannelsFelix Günther 0001, Sogol Mazaheri. 587-618 [doi]
- Ratcheted Encryption and Key Exchange: The Security of MessagingMihir Bellare, Asha Camper Singh, Joseph Jaeger, Maya Nyayapati, Igors Stepanovs. 619-650 [doi]
- PRF-ODH: Relations, Instantiations, and Impossibility ResultsJacqueline Brendel, Marc Fischlin, Felix Günther 0001, Christian Janson. 651-681 [doi]
- A New Distribution-Sensitive Secure Sketch and Popularity-Proportional HashingJoanne Woodage, Rahul Chatterjee, Yevgeniy Dodis, Ari Juels, Thomas Ristenpart. 682-710 [doi]